heroui logo

Linux Possible Access Or Modification Of sshd Config File

Splunk Security Content

View Source
Summary
This detection rule monitors for suspicious access or modifications to the `sshd_config` file on Linux systems, which is critical for secure SSH configuration. The rule utilizes data from Endpoint Detection and Response (EDR) solutions, focusing on specific command-line executions that include processes like `cat`, `nano`, `vim`, and `vi`, which are commonly employed to read or edit files. Unauthorized changes to the `sshd_config` file can enable attackers to redirect connections or install unauthorized keys, leading to potential unauthorized access and privilege escalation. This rule also includes steps for implementation, considerations for false positives related to legitimate administrative tasks, and references to further reading on SSH security. Overall, the rule plays a crucial role in mitigating risks associated with unauthorized file access that can compromise system security, potentially allowing backdoor access for attackers.
Categories
  • Linux
  • Endpoint
Data Sources
  • Pod
  • Script
  • File
ATT&CK Techniques
  • T1098
  • T1098.004
Created: 2024-11-13